Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Device (Router/Bridge/Hub)  >   Cisco Gigabit Security Router Vendors:   Cisco
Cisco Gigabit Security Routers Use Static Certificates and Keys That Let Remote Users Decrypt Potentially Sensitive User Connections
SecurityTracker Alert ID:  1034255
SecurityTracker URL:
CVE Reference:   CVE-2015-6358   (Links to External Site)
Date:  Nov 26 2015
Impact:   Disclosure of system information, Disclosure of user information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco Gigabit Security Routers. A remote user can decrypt user connections to obtain potentially sensitive information in certain cases.

The system uses a hard-coded certificate and hard-coded keys to protect user connections. A remote user that can conduct a man-in-the-middle attack can use the static credentials to decrypt user connections and obtain potentially sensitive information.

The following models are affected:

RVS4000 4-port Gigabit Security Router - VPN
WRVS4400N Wireless-N Gigabit Security Router - VPN V2.0

The vendor has assigned bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913 to this vulnerability.

Stefan Viehbck from SEC Consult Vulnerability Lab reported this vulnerability.

Impact:   A remote user that can conduct a man-in-the-middle attack can decrypt user connections and obtain potentially sensitive information.
Solution:   No solution was available at the time of this entry.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC